### [CVE-2024-0455](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0455) ![](https://img.shields.io/static/v1?label=Product&message=mintplex-labs%2Fanything-llm&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%201.0.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)&color=brighgreen) ### Description The inclusion of the web scraper for AnythingLLM means that any user with the proper authorization level (manager, admin, and when in single user) could put in the URL```http://169.254.169.254/latest/meta-data/identity-credentials/ec2/security-credentials/ec2-instance```which is a special IP and URL that resolves only when the request comes from within an EC2 instance. This would allow the user to see the connection/secret credentials for their specific instance and be able to manage it regardless of who deployed it.The user would have to have pre-existing knowledge of the hosting infra which the target instance is deployed on, but if sent - would resolve if on EC2 and the proper `iptable` or firewall rule is not configured for their setup. ### POC #### Reference - https://huntr.com/bounties/07d83b49-7ebb-40d2-83fc-78381e3c5c9c #### Github No PoCs found on GitHub currently.